Modern Information Technologies in the Sphere of Security and Defence <div id="focusAndScope"> <h3>Focus and Scope</h3> <p><strong>On the journal pages the following questions are considered:</strong></p> <p>1. Theoretical foundations and tool means of information technology creation and use in the sphere of security and defence.</p> <p>2. Evaluation criteria and assurance methods of quality, reliability, survivability of information technologies and systems.</p> <p>3. Optimization principles, decision-making models and methods when creating automated systems of different purpose in the sphere of security and defence.</p> <p>4. Researching regularity of information communications construction and developing theoretical foundations of intelligent information technologies construction and implementation for creation of modern collecting, processing, holding control systems in the sphere of security and defence.</p> <p>5. Interactive models of scientific and educational environment development in the sphere of security and defence.</p> <p>6. Holding, developing and transformation of cultural and linguistic heritage in interactive discourse of the context of state information security.</p> <p>7. Globalization, polilogicality and interactivity as philosophical background of information technologies development in the sphere of security and defence.</p> <p>8. Intelligent educational information technologies in the sphere of security and defence. Problems of learning technologies compatibility and interoperability.</p> <p>9. Modern approaches to designing distributed intelligent systems for education and science.</p> <p>10. Modern military theoretical problems.</p> </div> <div id="publicationFrequency"> <h3>Publication Frequency</h3> <p>The journal is published thrice a year:</p> <p>The first issue is April</p> <p>The second number is August</p> <p>The third room is December</p> </div> <div id="openAccessPolicy"> <h3>Open Access Policy</h3> <p>Scientific journal "Modern Information Technologies in the Sphere of Security and Defence" is an open-access. Users can read, download, copy and disseminate content for nonprofit educational and scientifical purposes with the saving of authorship.</p> </div> <div id="custom-0"> <h3>Publication Frequency</h3> <p>The journal is published thrice a year (April, August, December).</p> </div> <div id="custom-1"> <h3>Publication Ethics</h3> <p>The editorial board of the scientific journal <strong>"</strong>Modern Information Technologies in the Sphere of Security and Defence<strong>"</strong> support a certain level of requirements for selection and accepting of the articles submitted by authors. These rules are determined by the scientific fields covered in the journal. They are regulated by the Certificate of State Registration, and quality standards of scientific paper and its presentation adopted in the scientific community.</p> <p>Drawing up the items of the publication ethics policy of the scientific journal <strong>"</strong>Modern Information Technologies in the Sphere of Security and Defence<strong>"</strong> editorial board followed the recommendations of Committee on Publication Ethics (COPE, <a href=""></a>) and the experience of foreign professional associations and other Ukrainian and foreign research institutions and publishers.</p> <p>A feature of professional scientific community is the acceptance of the moral code which sets the basic rules of behavior and the responsibilities of the scientific community members before each other and in relation to the public. Such a code is defined by the intention to ensure maximum benefit to the professional community and to limit the actions, which could serve the interests of individuals, as well as to ensure an author's intellectual property rights.</p> <p>In addition to the aforesaid editorial board set the list of ethical standards bellow. It should guide persons (editors, authors and reviewers) involved in the publication of research results in the fields of science considered in the journal.</p> <p><strong>Ethical Obligations of Editors of the Journal:</strong></p> <p>1. All submitted materials are carefully selected and reviewed. An editorial board reserves the right to reject an article or return it as requiring improvement. The author is obliged to improve the article according to the remarks of the reviewers and the editorial board.</p> <p>2. An editor should considerate all manuscripts offered for publication without prejudice, evaluating each on its merits without regard to race, religion, nationality, status, or institutional affiliation of the author(s). An editor may take into account relationships of a manuscript under consideration to others previously offered by the same author(s).</p> <p>3. An editor should consider manuscript submitted for publication without delays.</p> <p>4. The whole responsibility for acceptance or rejection of an article rests with the editor. Responsible and reasonable approach to the duty requires that the editor seek advice from reviewers, Doctor of Science of required specialty, as to the quality and reliability of manuscripts submitted for publication. However, manuscripts may be rejected without external review if considered by the Editors to be inappropriate for the journal.</p> <p>5. The editor and members of the editor’s staff should not disclose any information about a manuscript under consideration to anyone other than those from whom professional advice is sought. After a positive decision has been made about a manuscript, it should be published in the journal and in the website of the journal.</p> <p>6. It is acceptable to spread articles published in the journal or quotations over the Internet with precondition of giving references and links to the primary source. Publication and/or distribution of materials from the journal by third parties or organizations in print and electronic media are prohibited.</p> <p>7. According to the international law of electronic media copyright, copying of materials published in electronic journal in full or in part is not allowed without the prior written permission of author(s) and Editors. In case of use of the published materials in context of other documents, references to the primary source are required.</p> <p>8. An editor should respect the intellectual independence of authors.</p> <p>9. Editorial responsibility and authority for any manuscript authored by an editor and submitted to the editor’s journal should be delegated to other qualified person, such as a member of its Editorial Board.</p> <p>10. If an editor is presented with convincing evidence that the main substance or conclusions of a report published in an editor’s journal are erroneous, the editor should facilitate publication of an appropriate report pointing out the error and, if possible, correcting it. The report may be written by the person who discovered the error or by an original author.</p> <p>11. An author may request that the editor not use certain reviewers in consideration of a manuscript. However, the editor may decide to use one or more of these reviewers, if the editor feels their opinions are important in the fair consideration of a manuscript. This might be the case, for example, when a manuscript seriously disagrees with the previous work of a potential reviewer.</p> <p><strong>Ethical Obligations of Authors:</strong></p> <p>1. Main duty of an author is to present an accurate account of the research performed as well as an objective discussion of its significance.</p> <p>2. Whole responsibility for content of articles and for the fact of publication rests with author(s). Editors do not bear responsibility for probable damage caused by publication of a manuscript to authors or third parties. Editors have the right to withdraw the article already published in case somebody's rights or generally accepted norms appear violated. Editors inform author(s) of the article, persons who gave recommendations and representatives of organization, where the research was held, about the fact of withdrawal.</p> <p>3. An author should be aware that journal space is a limited resource and should use it wisely and economically.</p> <p>4. A primary research report should contain sufficient detail and reference to public sources of information to permit the author’s peers to repeat the work. When requested, the authors should make a reasonable effort to provide samples of unusual materials unavailable elsewhere, with appropriate material transfer agreements to restrict the field of use of the materials so as to protect the legitimate interests of the authors.</p> <p>5. An author should cite those publications that have been influential in determining the nature of the reported work and that will guide the reader quickly to the earlier work that is essential for understanding the present investigation. Except in a review, citation of work that will not be referred to in the reported research should be minimized. An author is obligated to perform a literature search to find, and then cite, the original publications that describe closely related work. For critical materials used in the work, proper citation to sources should also be made when these were supplied by a non author.</p> <p>6. Any unusual hazards appearing during an investigation should be clearly identified in a manuscript reporting the work.</p> <p>7. Fragmentation of research reports should be avoided. A scientist who has done extensive work on a system or group of related systems should organize publication so that each report gives a well-rounded account of a particular aspect of the general study.</p> <p>8. In submitting a manuscript for publication, an author should inform the editor of related manuscripts that the author has under editorial consideration or in press. Copies of those manuscripts should be supplied to the editor, and the relationships of such manuscripts to the one submitted should be indicated.</p> <p>9. It is improper for an author to submit manuscripts describing essentially the same research to more than one journal of primary publication, unless it is a resubmission of a manuscript rejected for or withdrawn from publication. It is generally permissible to submit a manuscript for a full paper expanding on a previously published brief preliminary account (a “communication” or “letter”) of the same work. However, at the time of submission, the editor should be made aware of the earlier communication, and the preliminary communication should be cited in the manuscript.</p> <p>10. An author should identify the source of all information quoted or offered, except that which is common knowledge. Information obtained privately, as in conversation, correspondence, or discussion with third parties, should not be used or reported in the author’s work without explicit permission from the investigator with whom the information originated. Information obtained in the course of confidential services, such as refereeing manuscripts or grant applications, should be treated similarly.</p> <p>11. An experimental or theoretical study may sometimes justify criticism, even severe criticism, of the work of another scientist. When appropriate, such criticism may be offered in published papers. However, in no case is personal criticism considered to be appropriate.</p> <p>12. The co-authors of a paper should be all those persons who have made significant scientific contributions to the work reported and who share responsibility and accountability for the results. Other contributions should be indicated in a footnote or an “Acknowledgments” section. An administrative relationship to the investigation does not of itself qualify a person for co-authorship (but occasionally it may be appropriate to acknowledge major administrative assistance). Deceased persons who meet the criterion for inclusion as co-authors should be so included, with a footnote reporting date of death. No fictitious name should be listed as an author or coauthor. The author who submits a manuscript for publication accepts the responsibility of having included as co-authors all persons appropriate and none inappropriate. The submitting author should have sent each living co-author a draft copy of the manuscript and have obtained the co-author’s assent to co-authorship of it.</p> <p>13. The authors should reveal to the editor and to the readers of the journal any potential and/or relevant competing financial or other interest that might be affected by publication of the results contained in the authors’ manuscript. All authors should not have any personal significant financial interest and employment or other relationship with entities that have a financial or other interest which can affect the results described by the manuscript.</p> <p><strong>Ethical Obligations of Reviewers of Manuscripts:</strong></p> <p>1. As the reviewing of manuscripts is an essential step in the publication process, and therefore in the operation of the scientific method, every scientist has an obligation to do a fair share of reviewing.</p> <p>2. A chosen reviewer who feels inadequately qualified to judge the research reported in a manuscript should return it promptly to the editor.</p> <p>3. A reviewer of a manuscript should judge objectively the quality of the manuscript, of its experimental and theoretical work, of its interpretations and its exposition, with due regard to the maintenance of high scientific and literary standards. A reviewer should respect the intellectual independence of the authors.</p> <p>4. A reviewer should be sensitive to the appearance of a conflict of interest when the manuscript under review is closely related to the reviewer’s work in progress or published. If in doubt, the reviewer should return the manuscript promptly without review, advising the editor of the conflict of interest.</p> <p>5. A reviewer should not evaluate a manuscript authored or co-authored by a person with whom the reviewer has a personal or professional connection if the relationship would bias judgment of the manuscript.</p> <p>6. A reviewer should treat a manuscript sent for review as a confidential document. It should neither be shown to nor discussed with others except, in special cases, to persons from whom specific advice may be sought; in that event, the identities of those consulted should be disclosed to the editor.</p> <p>7. Reviewers should explain and support their judgments adequately so that editors and authors may understand the basis of their comments. Any statement that an observation, derivation, or argument had been previously reported should be accompanied by the relevant citation. Unsupported assertions by reviewers (or by authors in rebuttal) are of little value and should be avoided.</p> <p>8. A reviewer should be alert to failure of authors to cite relevant work by other scientists, bearing in mind that complaints that the reviewer’s own research was insufficiently cited may seem self-serving. A reviewer should call to the editor’s attention any substantial similarity between the manuscript under consideration and any published paper and any manuscript submitted concurrently to another journal.</p> <p>9. A reviewer should act promptly, submitting a report in a timely manner.</p> <p>10. Reviewers should not use or disclose unpublished information, arguments, or interpretations contained in a manuscript under consideration, except with the consent of the author. If this information indicates that some of the reviewer’s work is unlikely to be profitable, the reviewer, however, could ethically discontinue the work.</p> </div> <div id="custom-2"> <h3>Indexing</h3> <p><strong>The journal is indexed in the</strong> <strong><span style="text-decoration: underline;">scientometric databases</span>:</strong></p> <ul> <li><a href=";hl=uk">Google Academy</a></li> <li><a href=",p24782666,3.html">Index Copernicus</a></li> <li><a href="">The Journals Impact Factor</a></li> </ul> <p><strong>The journal is presented in the following <span style="text-decoration: underline;">databases</span>:</strong></p> <ul> <li><a href=";type=all&amp;oaboost=1&amp;ling=1&amp;name=&amp;thes=&amp;refid=dcresen&amp;newsearch=1">Bielefeld Academic Search Engine</a></li> <li><a href=";issn=23117249&amp;uid=r4e09b">Research Bible</a></li> <li><a href=";q=Modern+Information+Technologies+in+the+Sphere+of+Security+and+Defence">WorldCat</a></li> </ul> <p><strong>The journal is added to the following</strong> <strong><span style="text-decoration: underline;">libraries:</span></strong></p> <ul> <li><a href=";I21DBN=UJRN&amp;P21DBN=UJRN&amp;S21STN=1&amp;S21REF=10&amp;S21FMT=juu_all&amp;C21COM=S&amp;S21CNR=20&amp;S21P01=0&amp;S21P02=0&amp;S21P03=PREF=&amp;S21COLORTERMS=0&amp;S21STR=sitsbo">Vernadsky National Library of Ukraine</a></li> </ul> </div> <div id="custom-3"> <h3>Peer review process</h3> <p>The editorial board practices double-blind peer review. This process involves the following:</p> <p>- First, the editors consider all manuscripts to assess their compliance with the journal subject matter and requirements.</p> <p>- Following the decision of the editors, the manuscripts submitted are sent to at least two external experts in the corresponding field. The manuscript passes double-blind peer review, neither the authors nor the reviewers know each other.</p> <p>- Reviewers' comments are transmitted to the authors, together with possible recommendations for the manuscript revision. The editor informs the authors, whether the manuscript is adopted without revision or authors are given the opportunity to review the manuscript and submit it again, or the manuscript is rejected.</p> </div> <div id="history"> <h3>Journal History</h3> <p><strong>2008</strong> <span id="result_box" class="short_text" lang="en"><span class="hps">Print</span></span> <span id="result_box" lang="ru"><span class="hps">specialized scientific publications</span></span> "Modern Information Technologies in the Sphere of Security and Defence" was <span id="result_box" class="short_text" lang="en"><span class="hps alt-edited">founded</span></span> in 2008.</p> <p> </p> <p><strong>2009</strong> <span id="result_box" lang="ru"><span class="hps">According to the Resolution of the Presidium of the Supreme Certification Commission of Ukraine issued on October 14, 2009 (№ 1-05/4) the journal was included into the Ukrainian list of specialized scientific publications which are authorized to publish the results of dissertations for doctoral degree in engineering sciences and military sciences</span></span></p> <p><span lang="ru"><span class="hps"> </span></span></p> <p><span lang="ru"><span class="hps"><strong>2014 </strong>According to the Document of the Ministry of Education and Science of Ukraine issued on December 29, 2014 (№ 1528) the journal was included into the Ukrainian list of specialized scientific publications in engineering sciences and military sciences.</span></span></p> </div> en-US <p><span>Authors who publish with this journal agree to the following terms: </span></p><p><span>1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href=""><span>Creative Commons Attribution License</span></a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. </span></p><p><span>2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. </span></p><p><span>3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <span><a href="">The Effect of Open Access</a></span>).</span></p><p><span>4. Personal data and metadata contained in articles are available for storage and processing in various databases and information systems, including them in analytical and statistical reports, creating reasonable relationships of scientific </span>, literary and art objects with personal data, etc. on an area which is not limited.</p> (Roman Hrozovskyi) (Roman Hrozovskyi) Fri, 28 May 2021 07:32:18 +0000 OJS 60 EXPERIENCE OF ORGANIZATION OF MEDICAL SUPPORT OF TROOPS (FORCES) IN THE OPERATION OF THE JOINT FORCES <p><em>Studying the peculiarities of the work of the medical service of the Armed Forces of Ukraine on the planning, organization and implementation of medical care in peacetime and wartime in various conditions is a priority of its activities. According to the requirements of the guiding documents, medical support of troops (forces) must be organized in any conditions of activity of troops (forces): both in combat operations and in the conditions of daily activities of troops.) In modern hybrid warfare ) are influenced by factors of operational, combat, medical and logistical conditions. Therefore, in order to plan the medical support of troops (forces) in the Joint Forces Operation (ATO), it is necessary to study these factors, analyze their impact on the organization of medical support, draw conclusions and make decisions on the organization of medical support. The article considers the issues related to the factors influencing the organization of medical support of military units and formations, the general principles of the use of medical services in the JFO (ATO), the peculiarities of their use in different periods of the operation. </em></p> <p><em>The purpose of this article is to study the conditions of the medical service during the ATO (JFO), the general principles and methods of using the forces and means of the medical service of the Armed Forces of Ukraine during the operation (JFO). The authors consider the procedure (options) for using time reduction techniques to provide first aid, qualified and specialized medical care by creating new medical units (units), which were not previously provided, as well as integration processes into the civil health system. forces and means of medical service of both the Ministry of Defense of Ukraine and the Ministry of Health of Ukraine significantly reduce the time of providing first medical, qualified and specialized medical care to servicemen of the Armed Forces of Ukraine.</em></p> Mykhaylo Lozovuy , Oleh Vorobiov , Ihor Vlasov , Mykola Chaplia Copyright (c) 2021 Михайло Лозовий , Олег Воробйов , Ігор Власов , Микола Чапля Wed, 09 Jun 2021 00:00:00 +0000 FEATURES OF CREATING ANTI-CRISIS DECISION SUPPORT SYSTEM UNDER UNCERTAINTY OF INPUT INFORMATION IN EMERGENCY SITUATIONS <p><em>Creation of an efficient informational and analytical subsystem of prevention management processes and localization consequences of the emergency situations (ES) has been offered. It was made by complex inclusion in the operating Unified State Civil Protection System (USCPS) (from object to government) levels of various functional territorial system elements of monitoring emergency and system components of the situational centers. It was shown that one of trial functions of system situational centers at all USCPS management levels is development of&nbsp; efficient response crisis&nbsp; solutions, which is complicated by the fact that necessary conditions of effectiveness decisions is their timeliness, completeness and optimality. For increase in effectiveness of a decision making need of formal development, normative methods and models of a complex solution of the making decision problem in the conditions of the multicriterial and indeterminacy at prevention management processes and consequences emergency localization has been proved.In order to develop the scientific and technical foundations for creating a support system for making anti-crisis decisions in the system of situational centers of the USCPS, the paper presents a methodology for substantiating optimal anti-crisis solutions to ensure an appropriate level of safety of the state in ES of various nature in conditions uncertainty of input information for experts of the system of situational centers.</em></p> Igor Ruban , Vadym Tiutiunyk, Olha Tiutiunyk Copyright (c) 2021 Ігор Рубан, Вадим Тютюник , Ольга Тютюник Wed, 09 Jun 2021 00:00:00 +0000 METHODOLOGICAL FUNDAMENTALS OF COMPLEX JUSTIFICATION OF REQUIREMENTS FOR COMPREHENSIBILITY OF COMPLEX TECHNICAL SYSTEMS <p><em>The methodical bases of complex substantiation of requirements to reproducibility of difficult technical systems of military purpose are considered in the article.</em></p> <p><em>The procedure for conducting a comprehensive assessment of the possibility of restoring complex technical systems for military purposes is proposed.</em></p> <p><em>It is shown that in order to solve this problem it is necessary to solve a whole set of problems. The main ones are:</em></p> <p><em>failure analysis (disability) of complex technical systems for military purposes. Why it is necessary to decompose;</em></p> <p><em>analysis of the defeat of complex technical systems for military use when used for its intended purpose during hostilities;</em></p> <p><em>analysis of features of restoration repair and possibilities of repair bodies;</em></p> <p><em>substantiation of the relationship between damage, survivability of complex technical systems for military purposes and their reproducibility;</em></p> <p><em>to substantiate the need to make changes to the regulatory documentation when substantiating the requirements for the reproducibility of complex technical systems for military purposes.</em></p> <p><em>The solution of these problems, as shown in the article, can be based on a systematic approach, which is the basis of the article, the results of which are:</em></p> <p><em>the classification of possible damages of difficult technical systems of military purpose in the course of operation is offered;</em></p> <p><em>the technique of functional-morphological decomposition of complex technical systems of military purpose is considered;</em></p> <p><em>the main features of restoration repair of complex technical systems of military purpose are considered;</em></p> <p><em>the relationship between the reproducibility and survivability of complex technical systems for military purposes.</em></p> <p><em>It is shown that the considered methodical bases are the basis for substantiation of requirements to maintainability of difficult technical systems of military purpose.</em></p> Mychailo Shishanov , Igor Kondratiuk , Andrei Veretnov Copyright (c) 2021 Михайло Шишанов, Ігор Кондратюк , Андрій Веретнов Wed, 09 Jun 2021 00:00:00 +0000 ANALYSIS OF THE METHODOLOGICAL APPARATUS OF THREAT ASSESSMENT IN THE FIELD OF THE STATE BORDER SECURITY <p>The existing scientific and methodological apparatus, which was developed in the departments of the security and defense sector for its application in the headquarters of the State Border Guard Service of Ukraine and research organizations, is analyzed. The CIRAM 2.0 threat assessment methodology used by the State Border Guard Service of Ukraine may be supplemented by a methodology based on the application of the tuple method. To implement the defense planning methodology, at the stage of assessing the scenario and the situations that make them up, it is recommended to use the method of hierarchy analysis. As methods of strategic analysis for determining the directions of development of units and subdivisions of the State Border Guard Service of Ukraine, substantiation of their tasks, adequate methods are SWOT - analysis and Q - analysis, input data are prepared using tuple methods, hierarchy analysis and CIRAM 2.0 methodology. In the work of the governing bodies of the State Border Guard Service of Ukraine it is recommended to use the methodology of integrated use of military and non-military forces and means of the security and defense sector to counter modern threats to Ukraine's military security and military security research methodology.</p> Artem Bratko , Anatoliy Mysyk Copyright (c) 2021 Артем Братко, Анатолій Мисик Wed, 09 Jun 2021 00:00:00 +0000 DETERMINATION OF TECHNICAL CONDITION OF COMPONENTS OF SECONDARY POWER SUPPLIES BY PHYSICOCHEMICAL PROCESSES IN ELECTROLYTIC CAPACITORS DURING OPERATION <p><em>The conditions</em> <em>modernity and prospects for the development of the Ukraine Forces requires increasing the reliability of telecommunications equipment as a component of the control system. The state and conditions of existence of own military-industrial complex do not allow to fully provide the troops with a sufficient number of new samples of modern telecommunications equipment. One of the solutions to this problem is to extend the service life of existing telecommunications equipment. This can be achieved by providing high-quality, timely and complete maintenance. Thus, an important task of the existing system of maintenance and repair becomes the search for new and improving existing methods for determining the technical condition of telecommunications equipment, increasing the reliability of the forecast of its efficiency.</em></p> <p><em>Based on the above, this article analyzes and summarizes the main problematic issues related to the system of diagnostics of telecommunications equipment. The features of operation of secondary power sources of modern dual-purpose telecommunications equipment are considered. The specifics of the use of electrolytic capacitors in secondary power sources of modern dual-purpose telecommunications equipment are described. The comparative analysis of the currently existing methods of diagnosis was done. An alternative possibility of determining the actual technical condition of these elements (without withdrawal from the scheme) in real time by a non-contact induction method, based on the studied </em><em>physico-chemical</em><em> processes in them, is proposed.</em></p> Anatolii Minochkin , Vasyl Kuzavkov , Serhii Pohrebniak Copyright (c) 2021 Анатолій Міночкін, Василь Кузавков, Сергій Погребняк Wed, 09 Jun 2021 00:00:00 +0000 METHODOLOGY FOR ASSESSING THE EFFECTIVENESS OF METROLOGICAL SUPPORT OF WEAPONS AND MILITARY EQUIPMENT OPERATION <p><em>Reforming the Armed Forces of Ukraine concerns all types of support, including metrological support, the role of which is increasing significantly with the transition of the modern army to promising high-precision weapons systems and military equipment.</em></p> <p><em>Scientific works aimed at the development of military metrology were analyzed in the article and it was revealed that the issue of assessing the impact of metrological support on the effectiveness of weapons and military equipment was insufficiently covered.</em></p> <p><em>The purpose of the article is to develop a methodology for assessing the effectiveness of metrological support of weapons and military equipment operation.</em></p> <p><em>A methodology for assessing the effectiveness of metrological support of weapons and military equipment operation has been developed by building a model of weapon and military equipment operation with determination of the probability of finding the sample in possible states, building a model "weapons and military equipment sample - measuring equipment means" with determination of the possible probability of the sample performing the assigned task after metrological support, determination of the metrological support effectiveness indicator and calculation of the economic efficiency coefficient of metrological support.</em></p> <p><em>The obtained results will allow to analyze the existing metrological support systems, to determine the weaknesses and ways to eliminate them, to synthesize an optimal system of metrological support for the weapons and military equipment operation.</em></p> <p><em>The proposed methodology for assessing the effectiveness of metrological support for the weapons and military equipment operation&nbsp; may be useful in conducting metrological examination of weapons and military equipment, developing techniques that will determine the impact of metrological support for specific types of weapons and military equipment and metrological assessments that will provide more substantial&nbsp; contribution to increasing the efficiency of weapons and military equipment.</em></p> Mykola Shvets Copyright (c) 2021 Микола Швець Wed, 09 Jun 2021 00:00:00 +0000 PROBLEMS OF MANAGEMENT OF THE SYSTEM OF PROVISION OF MILITARY PROPERTY OF THE TROOPS OF THE ARMED FORCES OF UKRAINE AND WAYS OF THEIR SOLUTION <p><em>The article, based on the analysis of the troops (forces) of the Armed Forces of Ukraine at the present stage of development identifies the main problems of logistics as a management body for the military property of the troops (forces) of the Armed Forces of Ukraine and suggests ways to solve them.</em></p> <p><em>The issues of using common terms and concepts to ensure the defense forces in peacetime and special periods are considered. The authors identify one of the main problems - the creation of an effective system of defense forces of Ukraine, which is able to plan and manage the process of providing troops (forces) with military property both in peacetime and in special periods and will be compatible with NATO.</em></p> <p><em>The only effective functioning of the systems of providing military property troops (forces) of the Armed Forces of Ukraine is an urgent task for public administration bodies that organize the provision of the Armed Forces of Ukraine.</em></p> <p><em>Establishment of military property support systems (forces) of the Armed Forces of Ukraine, as a material flow management system, solves the problem of unification of existing types of logistics and technical support, placing them in NATO standards.</em></p> <p><em>The support system is considered as a methodology for developing rational methods of managing the provision of military property of the troops (forces) of the Armed Forces of Ukraine, aimed at optimization, with minimal labor and material resources.</em></p> <p><em>Finally, the directions of further research on improving the system of support of the Defense Forces of Ukraine are formulated.</em></p> Volodymyr Kyvlyuk , Viktor Lazorenko , Yuriy Hannenko; Mykhaylo Lavruk Copyright (c) 2021 Володимир Кивлюк , Віктор Лазоренко , Юрій Ганненко; Михайло Лаврук Wed, 09 Jun 2021 00:00:00 +0000 THEORETICAL AND METHODOLOGICAL BASIS OF INFORMATION ANALYSIS OF ECOLOGICAL AND MAN-GENERAL THREATS FOR POTENTIALLY HAZARDOUS FACILITIES OF CRITICAL INFRASTRUCTURE IN THE CONDITIONS OF THE ARMED CONFLICT IN THE EAST OF UKRAINE <p><em>This article discusses the development of theoretical and methodological foundations of information analysis of </em><em>environmental and technogenic threats to potentially dangerous critical infrastructure facilities in the context of a hybrid war in eastern Ukraine. Potentially dangerous objects of critical infrastructure in the east of Ukraine, which can become a source of factors of an emergency of military-technological origin in the event of a possible defeat by ammunition during the conduct of hostilities, are considered. This can lead to the emergence of a domino effect and losses among the population and personnel of the Armed Forces of Ukraine and other ARMED formations. A chain reaction of dangerous consequences can cause an ecological catastrophe in Donbass, which in scale may exceed the levels of impact of the use of weapons of mass destruction. An informational analysis of the location of critical infrastructure facilities relative to the demarcation line in the zone of the joint forces operation was carried out. A model has been developed for the classification of possible threats to critical infrastructure facilities.</em></p> Serhii Chumachenko , Rustam Murasov , Yaroslav Melnyk Copyright (c) 2021 Сергій Чумаченко , Рустам Мурасов , Ярослав Мельник Wed, 09 Jun 2021 00:00:00 +0000 EVALUATION OF ASSAULT TROOPS COMBAT POTENTIAL NECESSARY FOR SUCCESSFUL COMPLETION OF MULTI-STAGED COMBAT MISSIONS <p><em>The article considers the procedure for determining the necessary and optimal number of forces and means of units of the Assault Troops of the Armed Forces of Ukraine, necessary for the successful execution of combat missions. The proposed mathematical model is based on the concept of combat potential and uses the Lanchester quadratic equation to estimate the losses and the required initial potential of the forces conducting the offensive during each stage of the multi-stage combat mission and the task as a whole. Based on the analysis of the data obtained as a result of calculations of the mathematical model, a method of determining the optimal sequence of capture (destruction) of enemy objects, in which the percentage of losses is minimal (at a fixed value of initial combat potential) or the required initial potential (for a given percentage of losses) is the smallest. The order of actions of units in case of possible changes of routes of movement at change of the order of destruction of forces and means of the enemy is considered also, and as definition of an optimum order can become a little complicated and needs search of all possible options. According to the methodology, there is an example of calculations on the implementation of airborne raids, during which it is necessary to land on enemy territory, destroy (capture) three targets and take the defense in anticipation of the approach of the main forces. At the same time, the calculations take into account the losses of the combat potential of the airborne troops, which may occur during the execution of the combat mission. The results of the calculations are given in the tables containing the data for the analysis and selection of the most optimal option for the use of airborne raids in combat missions.</em></p> Yuri Adamov , Volodymyr Zavalnyuk , Valentin Didyk, Oleksandr Pechorin Copyright (c) 2021 Юрій Адамов , Володимир Завальнюк, Валентин Дідик, Олександр Печорін Wed, 09 Jun 2021 00:00:00 +0000 METHODOLOGICAL APPROACH TO CREATION AND ACCESS TO REMOTE VIRTUAL STORAGE OF EDUCATIONAL CONTENT FOR THE TRAINING OF ARTILLERY SPECIALISTS <p><em>Modern conditions for the use of the Armed Forces of Ukraine determine new requirements for the organization of education and training of military specialists. To ensure the high quality of training of specialists in the technical direction, an important condition is the use of modern training tools that allow to reflect the real conditions as much as possible, to simulate the processes occurring during the functioning of the armament. In order to form students' practical skills and abilities in conditions of limited time and access to the training facilities, which is primarily due to the spread of the coronavirus, the authors of the article suggest using a remote virtual storage of educational content.</em></p> <p><em>Based on the experience of the Department of Military Training of Sumy State University, the article discusses a general approach to the creation of remote virtual storage of educational content and access to it. The advantages of using the specified software in the educational process are formulated.</em></p> <p><em>The main phases of creating a virtual storage of educational content are given.</em></p> <p><em>Based on the results of the analysis of a pedagogical experiment with users of educational content, it was concluded that the use of a virtual storage of educational content has a positive effect on improving the quality and increasing the level of training in the study of military-technical disciplines.</em></p> Dmitro Chopa , Anatolii Derevianchuk , Vladislav Derevianchuk Copyright (c) 2021 Дмитро Чопа , Анатолій Дерев’янчук, Владислав Дерев’янчук Wed, 09 Jun 2021 00:00:00 +0000 MODELS OF KNOWLEDGE DESIGN OF EXPERT TRAINING SYSTEM FOR MILITARY SPECIALISTS <p><em>The current trend in the training of future military specialists is the use of a new class of information technology training, namely, expert training systems, the main purpose of which is to solve problems.&nbsp; The main components of the expert training system (ESS) are identified: knowledge base;&nbsp; training module;&nbsp; knowledge extraction module;&nbsp; testing module;&nbsp; output machine;&nbsp; explanation.&nbsp; ENS is based on three groups of basic principles: cybernetic - reflect the experience of previous studies of artificial intelligence systems, ENS;&nbsp; pedagogical - determine the principles on which the pedagogical design and application of ENS is based;&nbsp; psychological - determine the initial positions and understanding of the psyche of the listener, which are based on the processes of design and use of ENS in the training of future military professionals.&nbsp; The structure of ENS, which consists of an interpreter (provides a sequence of rules for solving a specific problem) database and knowledge (consists of facts and rules of the subject area) of explanation subsystems (allows the student to get an answer to the question: "Why does the system make such a decision?");&nbsp; intelligent knowledge base editor (designed to modify existing rules and add new ones) interface. The existing models of knowledge representation of the expert-training system of military specialists training are analyzed: a model based on the use of frames;&nbsp; logical model;&nbsp; model based on the use of rules (production model);&nbsp; semantic network model.&nbsp; Areas of effective application of the considered models are shown.&nbsp; The analysis showed the rationality of the application of the semantic-frame model of knowledge representation in the system of training military specialists with complex logical connections between their concepts and definitions.&nbsp; An example of construction of ENS with the choice of combinational, namely semantic-frame model of knowledge representation is shown. Features of the semantic-frame model of knowledge representation are highlighted: concepts, categories, objects are presented in the form of frames, connection between frames in the form of a semantic network. The software implementation of the model can be performed using the MS SQL database management system.&nbsp; The use of such a model is especially important in the process of solving complex and problematic situations in the process of training military specialists.</em></p> Spartak Нohonіants , Oleg Zabolotny , Alla Klochko , Evgeny Rudenko Copyright (c) 2021 Спартак Гогонянц , Олег Заболотний , Алла Клочко , Євген Руденко Wed, 09 Jun 2021 00:00:00 +0000 THE INTELLECTUALIZATION MODEL OF TIME SCHEDULING FOR PERFORMING A TRAINING TASK IN A DISTANCE LEARNING SYSTEM <p><em>The research in the field of artificial intelligence as a science that deals with the creation of intellectualized automatic systems was covered in the article.</em> <em>Aspects investigated technology of artificial intelligence systems, as well as revealed some approaches to their creation were researched. The place of intellectualization of administration of distance learning systems is indicated.</em> <em>The article deals with the prospects of artificial intelligence that is constantly transforming changes depending on emerging trends and challenges of today</em> <em>and about seeing the ways of its further development, approaches to study and functioning.</em> <em>Currently, promising areas within the constraints of the educational process are elements of intellectualization management and automation of certain components of educational systems in distance learning. Intellectualization of administration in the educational process will make it possible to automate a number of routine, typical tasks that require human resources and take a lot of time. One of them is the intellectualization model of time scheduling for performing a training task in a distance learning system.</em> <em>The article presents a model of intellectualization of this process. These are just the first steps towards creating a powerful artificial intelligence in the field of military education.</em></p> Yurii Kravchenko, Yevhenii Makhno , Maksym Tyshchenko, Oleksandr Shapran Copyright (c) 2021 Юрій Кравченко, Євгеній Махно, Максим Тищенко, Олександр Шапран Wed, 09 Jun 2021 00:00:00 +0000 METHOD OF DETERMINING THE RATIONAL SPATIAL STRUCTURE OF THE RADIO SURVEILLANCE SYSTEM OF THE AIR ENEMY <p>The effectiveness of air defense troops and facilities depends significantly on the functioning of the enemy's reconnaissance system. The timeliness of the issuance of information on enemy air attack means to anti-aircraft missile divisions is crucial for their reliable defeat. Uncertainty of air attack means, namely the height of their use and directions of attack on troops and objects, necessitates the need to consider several options for building the spatial structure of the enemy's reconnaissance system in order to optimize it.</p> <p>The article proposes a method for determining the rational spatial structure of the enemy reconnaissance system, in which the optimization criterion is the effectiveness of the enemy reconnaissance system, which is estimated by the mathematical expectation of the relative number of air attack means from the strike, detected and timely information divisions.</p> <p>The effectiveness of the enemy's reconnaissance system is defined as the product of the probability of identifying the objectives of the enemy's reconnaissance system and the probability of timely issuance of information on them to anti-aircraft missile divisions. The probability of detecting the target of the enemy air reconnaissance system is determined taking into account the overlap of the radar field, the probability of timely delivery of information to anti-aircraft missile divisions using the normal Laplace distribution function. When assessing the effectiveness of the enemy air reconnaissance system, the possible ranges of heights of the use of air attack means and the directions of their strikes on troops and objects are taken into account. The distribution of air attack means by altitude ranges is carried out by the heuristic method. Coefficients of importance (danger) of directions of blows of means of air attack are defined with use of an expert method of ranking.</p> <p>Variants of the spatial structure of the enemy reconnaissance system differ in the location of radar stations on the ground. A variant of the spatial structure is considered rational, which corresponds to the maximum efficiency of the enemy's reconnaissance system.</p> <p>The procedure for using the developed method of determining the rational spatial structure of the enemy air reconnaissance system is shown by example. The technique can be used during the organization of reconnaissance of the enemy air by the control bodies of radio troops.</p> Oleksii Zahorka , Serhii Polishchuk , Iryna Zahorka Copyright (c) 2021 Олексій Загорка, Сергій Поліщук, Ірина Загорка Fri, 28 May 2021 00:00:00 +0000 MODEL AND METHOD OF INFORMATION FLOW MANAGEMENT IN THE TELECOMMUNICATIONS NETWORK OF THE TACTICAL LEVEL OF COMMAND <p>This article provides a review and analysis of trends in the development and application of the latest technologies and means of communication in the units of the tactical level of command of the Armed Forces of Ukraine. It is shown that the country is working on establishment of effective system of operational management, communication, intelligence and surveillance (C4ISR), which would meet NATO requirements. Technologically, as the basis for implementation of this system should be a <a href="">unified</a> automated system of the Armed Forces of Ukraine. It is noted that the problematic issue is the need to develop new technological solutions for network resources management to ensure their balanced loading and guaranteed quality of service of heterogeneous traffics in such a system. The analysis of existing models of the solving of the basic network problems is carried out. It is shown that the tensor approach allows to solve the problems which appear during taking into account the interconnected and at the same time contradictory requirements occurring during heterogeneous traffic management in the military telecommunications network. A model and method of multi-path routing of control commands transmission between different nodes (elements) of the information and telecommunication network taking into account the streaming nature of traffic have been developed. The results of network calculations using the above mentioned developed model and method are presented. A comparative assessment of the developed model with the known existing ones has been carried out.</p> Oleksandr Lavrut, Tetiana Lavrut, Yuriy Zdorenko, Vladyslav Kolesnyk Copyright (c) 2021 Олександр Лаврут, Тетяна Лаврут, Юрій Здоренко, Владислав Колесник Wed, 09 Jun 2021 00:00:00 +0000 METHODS FOR ANTI-ENTRY VIRUS IN INFORMATION SYSTEMS <p><em>The article proposes an algorithm for the actions of the system administrator to counteract attempts at unauthorized encryption of information in information systems.</em><em>The relevance of the development of such measures is that the number of ransomware attacks reaches 30 percent of the total number of cyber incidents in the world.</em> <em>Massive attacks occur every six months, and penetration techniques and encryption algorithms are constantly improving. According to the Cyber-Kill Chain model, attackers successfully achieve their goal on the target machine.</em><em>The purpose of measures to neutralize unauthorized encryption of information in the system is to block its action at the beginning of work.</em><em>The authors propose to deploy in advance in information systems software samples that will allow timely identification of signs of the beginning of unauthorized encryption of information in systems.</em><em>The measures provide for the advance placement in systems of samples of special software that are able to implement "constant program monitoring" of processes in the system, stop the processor when signs of encryption are detected, namely: when the processor is overloaded, when suspicious processes are detected, when signs of the encryption algorithm are detected when important files disappear simultaneously, when an unauthorized system reboot is attempted, and other signs. The authors compare the cyber defense of systems without and with the proposed measures. The authors believe that the cyber defense of systems will increase to 0.99 depending on the effectiveness of the measures involved.</em><em>The conclusion of the article is that the advance placement of specialized software in systems will allow timely blocking of the ransomware virus and increase the security of systems.</em><em>Further directions of research will allow the dissemination of the proposed measures to neutralize the actions of various classes of cyber attacks, which were achieved according to the Cyber-Kill Chain model of the target machine.</em></p> Roman Shtonda, Vladimir Kutsaev, Elena Sivokha, Mikhail Artemchuk Copyright (c) 2021 Роман Штонда , Володимир Куцаєв, Олена Сівоха, Михайло Артемчук Wed, 09 Jun 2021 00:00:00 +0000 FUZZY LOGIC BASED ACTIVE QUEUE MANAGEMENT IN TACTICAL RADIO NETWORKS <p><em>In context of impact of destructive external factors and the absence of the traditional telecommunications infrastructure necessary information transmission networks with rapid deployment, self-powered nodes, high survivability, ability to deliver messages with dynamically varying topology (random worker processes of network nodes).</em> <em>Such capabilities achieved through the creation of wireless self-organizing networks with decentralized structure (Mobile Ad-Hoc Networks, MANET).</em><em>The building such networks main advantages are: implementation of decentralized management of network components; no fixed nodes; each node function a router. The MANET networks have prospects of application to ensure communication in the tactical level. These networks will provide continuous and stable exchange of information both by moving on combat equipment (command and chef machine, armored vehicles, cars) and on foot.</em><em>Ensuring the quality of service in Ad-Hoc networks for protocol developers, network equipment and end users still an actual problem. The buffering and query management mechanisms actively used at all levels of network. These mechanisms also include adaptive ones that designed to service traffic bursts minimal lost, and to provide sufficient bandwidth and acceptable time delays.</em><em>Processes in mobile </em><em>tactical radio network with the developed fuzzy controller based on interactive system MATLAB investigated in article. The network presented by the closed loop system of automatic control (system with active queue management) with variable parameters (variable number of communication channels (number of sessions TCP) N(t) and variable round trip time R(t)). The developed fuzzy controller is effective in tactical radio network. The fuzzy controller use it allows keeping the current queue length close to desired one and effective practical data transfer rate.</em></p> Mykola Masesov , Vadym Krotov , Pavlo Open’ko Copyright (c) 2021 Микола Масесов, Вадим Кротов, Павло Опенько Wed, 09 Jun 2021 00:00:00 +0000 MATHEMATICAL MODEL OF AUTOMATED COMMAND AND CONTROL IN AUTOMATED COMMAND AND CONTROL SYSTEM SIMILAR TO C4ISR <p><em>The article is devoted to the development of a mathematical model of automated command and control (C2) in the automated C2 system similar to C4ISR based on provisions of command and control theory.</em></p> <p><em>In accordance with the course for Ukraine's Euro-Atlantic integration, a number of </em><em>s</em><em>tate documents identify one of the priorities of defence reform as the development of a unified automated command and control system of the Armed Forces of Ukraine (UASU) as a basis for C2 of the state defence forces, based on C4ISR projects decisions and NATO standards. However, despite this, its status, for some reason, does not meet the requirements for this system.</em></p> <p><em>One of the reasons is the underdevelopment of an existing methodology used to model the process of C2. First of all, this concerns the lack of a single mathematical model of automated C2 in the UASU similar to C4ISR, which directly affects the development and compliance with a unified ideology to justify the requirements for this system.</em></p> <p><em>To achieve the goal of the article, its authors presented the UASU similar to C4ISR as a cybernetic system that provides automated C2 based on certain command principles, classification features and basic functions inherent in these systems in countries of NATO.</em></p> <p><em>Accordingly, a mathematical model of the process of automated C2 was developed, which takes into account the sequence of the C2 cycle and allows to research the impact of each of the means of automated C2 on the C2 process taking into account data on a given task, Enemy Manning&amp;Table of Equipment as well as Enemy actions.</em></p> <p><em>In order to ensure a unified ideology, the model should become an analytical and simulation basis for the development of the theory to substantiate the requirements for UASU prototype, which is a potential area of further research.</em></p> Uriy Husak , Serhiy Kirsanov , Serhiy Ostrovskiy Copyright (c) 2021 Юрій Гусак, Сергій Кірсанов , Сергій Островський Wed, 09 Jun 2021 00:00:00 +0000 A NEW APPROACH TO PLANNING THE FLIGHT ROUTE OF UNMANNED AIRCRAFT BASED ON FUZZY SETS <p><em>The article proposes an approach to formalize knowledge about the process of planning the flight route of an unmanned aerial vehicle at the stage of planning aerial reconnaissance using heuristic methods that are the best in terms of taking into account the practice, experience, intuition, knowledge of decision-makers when conducting aerial reconnaissance. The use of an unmanned aerial vehicle in the conditions of requirements and restrictions, the flight technical capabilities of an unmanned aerial vehicle, the availability of means of destruction of the enemy suggests a large variety of flight route options, which makes it difficult to make an informed decision on building the optimal flight route for an unmanned aerial vehicle. As the experience of the practical application of submarines shows, the conditions, requirements, restrictions imposed on reconnaissance tasks, the influence of external factors, the account of the most important objects for overflight, can contradict each other, creating uncertainty when giving priority to any of them in planning. The developed method of formalizing knowledge about the process of flight planning of an unmanned aerial vehicle based on INMT2 allows one to formalize factors that take into account the tactical conditions for conducting aerial reconnaissance, the influence of the external environment on the flight range of an unmanned aerial vehicle in the form of linguistic and interval-estimated parameters for each option, which allow taking into account uncertainty; to form the domain of definition of linguistic variables used to describe the tactical conditions for conducting aerial reconnaissance and the influence of the external environment on the flight range of an unmanned aerial vehicle; to form the most significant ground objects from the set of the most important objects of aerial reconnaissance on the basis of an assessment of the degree of non-dominance of elements; to formalize the flight strategies of an unmanned aerial vehicle for each possible variant of operational construction, the influence of the external environment in the form of fuzzy production rules, where fuzzy linguistic expressions are used as an antecedent, consequent.</em></p> Oleksandr Permiakov, Natalia Korolyuk, Anastasiia Korolyuk, Liudmyla Korotchenko Copyright (c) 2021 Олександр Пермяков, Наталія Королюк, Анастасія Королюк, Людмила Коротченко Wed, 09 Jun 2021 00:00:00 +0000 THE METHOD OF A JOINT AVIATION GROUP FORMING <p><em>Today, more information appears about joint flights of manned and unmanned aviation to perform a common task. The benefit of this symbiosis lies in increasing the effectiveness of the aviation combat mission, saving the life of personnel, reducing the cost of completing a mission, increasing the ability to restore combat effectiveness, etc. But the problem arises of how to manage the formation of joint aviation groups of manned and unmanned aviation in flight? What mathematical apparatus exists today that will make it possible to effectively, in accordance with certain criteria, manage aviation as part of joint aviation groups?</em></p> <p><em>The aim of the article is to solve the above problem by applying the provisions of the theories of classical mechanics and dynamics of complex mechanical systems. The relevance of the problem is explained by the fact that among the large number of problems associated with the control of complex mechanical systems, the problem of forming the required (given) configuration is the most popular and multivariate, depending on the initial conditions.</em></p> <p><em>The ultimate goal of formalizing the process of forming a joint aviation group will be the formation of a configuration of a complex mechanical system by means of two-criteria optimization in a minimum time with a minimum of energy consumption. In this case, the motion of each of the elements of the system will be described by differential equations.</em></p> <p><em>The proposed procedure for solving the problem of optimal configuration control of a joint aviation group of manned and unmanned aviation forms the basis of the method a joint aviation group forming, in order to reduce the time required for calculations, it can be implemented in a neural network, and will increase the overall efficiency of symbiotic (joint) combat mission of manned and unmanned aviation.</em></p> Leonid Artyushin, Volodymyr Herasymenko , Volodymyr Koval Copyright (c) 2021 Леонід Артюшин, Володимир Герасименко, Володимир Коваль Wed, 09 Jun 2021 00:00:00 +0000 THE MODEL OF COMBATING BY ARTILLERY UNITS DURING FIRE SUPPORT DURING OFFENSIVE ACTIONS <p><em>The results of the analysis of the lessons learned from the conduct of hostilities by artillery units in the armed conflict in eastern Ukraine show that the issues of increasing the effectiveness of their conduct of hostilities and ensuring their viability are now relevant. On the basis of an analysis of the methods of ensuring the survivability of artillery units, it was determined that the main of them during the fighting were constant maneuvering when designating waiting areas (charging). It is also known that the conduct of combat operations by artillery units in the offensive constitutes the continuous fire support of the units. </em></p> <p><em>Thus, in the theory and practice of combat actions by artillery units, there have being a contradiction in the offensive between the need to increase the time spent in firing positions depending on the level of firepower required to provide continuous fire support to active units on the one hand, and the requirement to reduce that time necessary maneuver to ensure the survivability of the artillery units on the other hand.</em></p> <p><em>The purpose of the article is to develop a model of combat actions of artillery units during fire support in offensive actions, taking into account their constant maneuvering to ensure survivability and stay in the charging (waiting) area.</em></p> <p><em>The article describes the model of combat operations by artillery units supported by fire in offensive actions. The model is stochastic and analytical and describes the probability of artillery combat offensive actions with fire support during offensive actions using the theory of random processes with a finite set of successive permanent changes in their functional states due to the influence of environmental factors and control factors under the conditions of possible hostile fire, provided such elements are available on the order of as waiting (charging) areas. The proposed combat actions model can be used to find cause-effect relationships between the components of such processes and to substantiate recommendations for ensuring the survivability of artillery units with fire support in offensive actions</em></p> Yurii Repilo , Oleg Golovchenko Copyright (c) 2021 Юрій Репіло, Олег Головченко Wed, 09 Jun 2021 00:00:00 +0000 MATHEMATICAL FORMALIZATION OF INFLUENCE OF COMBAT APLICATION OF LONG-TERM MEANS OF DAMAGE ON ACHIEVEMENT OF FIRE ADVANTAGE OVER THE ENEMY <p><em>The results of the analysis of local wars and </em><em>modern </em><em>armed conflicts show a steady trend, in the armies of the world's leading countries, to achieve success in hostilities by increasing the share of long-range weapons in enemy fire in hostilities. In such actions, all-military formations perform the function of completing the defeat of the enemy. This, in turn, has led to the modernization of existing and development of new long-range weapons in terms of increasing the range of fire and rate of fire, which is the basis of reconnaissance and strike combat platforms of all-military units (forces).</em> <em>In countries that are limited in their capabilities for the rapid development of long-range weapons by increasing the fire tasks of units capable of long-range fire damage to the enemy is the justification of appropriate scientific and organizational decisions, the implementation of which will achieve the desired effect of combat use of such units.</em> <em>In the article, depending on the probability of achieving a fire advantage over the enemy on the degree of realization of fire capabilities involved in the fire defeat of the enemy fire means substantiated ways to increase the degree of fire capabilities of units armed with long-range weapons. According to the results of the study, a set of indicators of the effectiveness of combat use of units armed with long-range weapons was further developed.</em> <em>The proposed efficiency indicators, in contrast to the existing ones, make it possible to establish the dependence of the probability of achieving a fire advantage over the enemy on the effectiveness of combat use of these units and to justify possible ways to increase the effectiveness of their use.</em></p> Volodymyr Prymirenko Copyright (c) 2021 Володимир Приміренко Wed, 09 Jun 2021 00:00:00 +0000 FEATURES OF ANALYSIS OF OPEN SOURCES IN THE DEVELOPMENT OF THE PASSPORT OF TARGET AUDIENCES IN THE INTEREST OF THE IMPLEMENTATION OF STRATEGIC DERATOR <p><em>The article considers the analysis of open sources based on the method of OSINT intelligence in the development of passports of the target audience in the interests of the implementation of the strategic narrative of the state.</em></p> <p><em>To achieve the goal of the article, the author generalized approaches to the analysis of open sources of information and developed proposals for the formation of the passport of the target audience. The process of conducting intelligence from open sources of information is defined, the criteria which are put forward to the intelligence received from open sources of information are substantiated. The types of conducting such reconnaissance are considered. The generalized criteria made it possible to determine the list of software products that can be rationally used in open source exploration, as well as a brief overview and capabilities of these software products.</em></p> <p><em>In order to summarize and systematize the information obtained from open sources, the author proposes to create a passport of the target audience. The general structure of the passport form and features of the structure of filling in the received information from open sources are considered.</em></p> <p><em>The proposed approach to the analysis of open sources in the development of the target audience's passports in the interests of the strategic narrative of the state will allow to correctly build and implement a system of information security in the military sphere in the form of strategic communications of the Ministry of Defense and the Armed Forces of Ukraine. The analysis will provide an opportunity to identify the main needs and vulnerabilities of target audiences and realize the interests of the state in the form of public support for the strategic course of the state to gain full membership of Ukraine in the EU and NATO.</em></p> Oleksandr Voiitko Copyright (c) 2021 Олександр Войтко Wed, 09 Jun 2021 00:00:00 +0000 MODEL OF SCIENTIFIC AND TECHNICAL SPHERE OF THE STATE MILITARY SECURITY SYSTEM <p><em>In the absence of a complete theory in the chosen subject area, the indispensable tool of the researcher remains the model of the object or phenomenon to be studied. Despite the specific features of the model, it should be noted that the process of obtaining the required model is always based on a careful study of the original object. If the mechanism of functioning of the original object is available for disclosure and understanding, and its individual components are subject to full (within the study) study, then it is natural to build and further apply a simulation model.</em></p> <p><em>But the theory of military security of the state deals with objects and phenomena, the properties of which to varying degrees, but always depend on the "human factor", so it is difficult to formalize. This fact means that, as a rule, the "true" mechanism of functioning of the object of study remains hidden from the researcher, and the study of the properties of individual components of the object of study is impossible to the necessary extent. However, even in such cases, there is a need to use appropriate models in the study, and the object of study is presented as a kind of "black box".</em></p> <p><em>Cognitive modeling is one of the types of modeling that takes into account both the peculiarities of the perception of the situation and the vagueness of the description of the situation and the object of modeling, and is based on the use of formal methods.</em></p> <p><em>The article considers the cognitive model of the scientific and technical sphere as a component of ensuring the military security of the state. Based on the known model, the methods of determining the structure and parameters of the model, its application to determine the most influential factors for the functioning of the system, as well as ways to modify the model to take into account current realities.</em></p> Olena Derhylova Copyright (c) 2021 Олена Дергильова Wed, 09 Jun 2021 00:00:00 +0000